Widget edited by Geri-Riskiyanto

Social Icons

Pages

Featured Posts

Answers Cisco Networking Academy

Rabu, 04 Desember 2013

CCNA 1 Final Version 4.0 Answers


  1.Host A attempts to establish a TCP/IP session with host C...

Refer to the exhibit. Host A attempts to establish a TSP/IP session with host C. During this attempt, a frame was captured at the FastEthernet interface fa0/1 of router Y. The packet inside the captured frame has the IP source address 172.16.1.5 and the destination IP address is 172.16.7.24 . What is the source MAC address of the frame at the time of capture?

0040.8596.DE82

**0060.7320.B826

0060.7320.D632

0010.4F74.AC09

0040.8596.DE81

2.Refer to the exhibit. An employee wants to access the organization intranet from home. Which intermediary device should be used to connect the organization intranet to the Internet to enable this access?

hub
switch
**router
wireless access point

3.The host was disconnected from switch 2 and connected to switch 1. Which combination of IP address, subnet mask, and default gateway should be assigned to this host to allow it to function in the network?

Refer to the exhibit. The host was disconnected from switch 2 and connected to switch 1. Which combination of IP address, subnet mask, and default gateway should be assigned to this host to allow it to function in the network?

IP address: 10.10.9.37 Subnet mask: 255.255.255.240 Default gateway: 10.10.9.35
**IP address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35
IP address: 10.10.9.29 Subnet mask: 255.255.255.248 Default gateway: 10.10.9.35
IP address: 10.10.9.32 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35
IP address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 196.1.105.6
IP address: 10.10.9.63 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35

4. Which range of port numbers is assigned dynamically to client applications when initiating a connection to the server?

0 to 255
**49152 to 65535
1024 to 49151
0 to 1023

5. Refer to the exhibit. The diagram represents the process of sending e-mail between clients. Which list correctly identifies the component or protocol used at each numbered stage of the diagram?

1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA
1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA
1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA
**1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA

6. Refer to the exhibit. While configuring a network, a technician wired each end of a Category 5e cable as shown. Which two statements are true about this setup? (Choose two.)

**The cable is suitable for connecting a switch to a router Ethernet port.
**The cable is suitable for connecting dissimilar types of devices.

The cable is unusable and must be rewired.
The cable is terminated in a way that the transmit pin is wired to the receive pin.
The cable simulates a point-to-point WAN link.

7. Refer to the exhibit. Which two facts can be determined about the topology? (Choose two.)

**Four collision domains are present.
One logical network is represented.
**Two broadcast domains are present.
Three networks are needed.
Three logical address ranges are required.

8.nslookup command on the PC
Refer to exhibit. A technician uses the nslookup command on the PC and views the output that is displayed in the exhibit. What is the IP address of the primary domain name server used by the host?

**10.10.10.32
192.168.1.5
192.168.1.99
192.168.2.100

9. Which subnet mask will allow 2040 hosts per subnet on the IP network 10.0.0.0?
255.255.0.0
255.255.254.0
255.255.252.0
**255.255.248.0
255.255.240.0
255.255.255.128

10. Which three addresses belong to the category of private IP addresses? (Choose three.)

**10.0.0.1
127.0.0.1
150.0.0.1
**172.16.0.1
**192.168.0.1

200.100.50.1

11. Host A is transmitting data to host B. Which address combination will be used as the data leaves the Router1 Fa0/1 interface?

Refer to the exhibit. Host A is transmitting data to host B. Which address combination will be used as the data leaves the Router1 Fa0/1 interface?
Destination IP: 192.168.72.2 Source MAC: 0007.C2B4.3421
**Destination IP: 192.168.10.4 Source MAC: 0030.8596.DE81
Destination IP: 192.168.10.4 Source MAC: 0007.C2B4.3421
Destination IP: 192.168.72.2 Source MAC: 0030.8596.DE81

12. Which memory contents will change as a result of using the Router# erase startup-config command on a router?

RAM
ROM
flash
**NVRAM

13. What are two characteristics of the data link layer? (Choose two.)
**It segments and reorders the data.
It exchanges the frames between nodes.
**It defines the method by which network devices place data onto the media.
It manages the transfer of data between the processes that run on each host.
It retrieves signals from the media and restores them to their bit representations.

14. Refer to the exhibit. The NAT functionality of the router is enabled to provide the PC with Internet access. Which IP address can be assigned to router interface Fa0/0?

10.0.0.1
172.16.1.1
**209.165.201.1
192.168.1.1

15. A user wants to access the Internet from the PC. A part of the running configuration of the router is shown

Refer to the exhibit. A user wants to access the Internet from the PC. A part of the running configuration of the router is shown. Which default gateway IP address should be configured at the PC to enable this access?

10.1.192.2
10.1.192.54
**10.1.192.1
192.31.7.1

16. Refer to the exhibit. A network technician wants to connect host A to the console of a Cisco switch to initialize the configuration. What type of cable is required for this connection?

straight-through cable
crossover cable
**rollover cable
serial cable

17. A network administrator wants to restrict access to the router privileged EXEC mode. Which password should the administrator use?

**enable
aux
console
VTY

18. What are three characteristics of CSMA/CD? (Choose three.)

**Devices listen to the media and transmit data only when they cannot detect another signal on the media.
**All devices on the media can hear all communications.

Devices communicate based on a configured priority.
After a collision occurs, the devices that caused the collision have first priority when attempting to retransmit.
**When a collision occurs, all devices stop transmitting for a randomly generated period of time.
CSMA/CD uses a token system to avoid collisions.

19. Refer to the exhibit. The router of the company failed and was replaced. After the replacement, hosts C and D in the Education office are able to ping each other, but they are unable to access the hosts in the Accounts office. What is the likely cause of the problem?

The IP address at the fa0/0 interface of the router is incorrectly configured.
**The subnet mask at the fa0/1 interface of the router is incorrectly entered.
The IP address at the serial interface of the router is incorrectly configured.
The hosts in the Accounts office are not on the same subnet as the hosts in the Education office.

20. Refer to the exhibit. Host A and B are unable to communicate with each other. What is the reason for this?

Host A is assigned a network address.
Host B is assigned a multicast address.
Host A and host B belong to different networks.
**The gateway addresses are network addresses.

21. Refer to the exhibit. A user wants to view the current configuration. The output of the ipconfig/all command is displayed in the exhibit. What three facts can be determined from the output? (Choose three.)

The IP address is obtained from the DHCP server.
**This PC cannot communicate with other networks.
**The network can have 14 hosts.

The prefix of the computer address is /25.
The IP address is routable on the Internet.
**The assigned address is a private address.

22. Which two types of media can provide bandwidth up to 1 Gb/s? (Choose two.)

10 BASE-T
100 BASE-T
100 BASE-FX
**1000 BASE-TX
**1000 BASE-SX


23. Refer to the exhibit. RouterB is configured properly.
The Ethernet interface Fa0/0 of RouterA is configured with the use of the commands that are shown However, a ping from the Fa0/0 interface of RouterA to the Fa0/0 interface of RouterB is unsuccessful. What action should be taken on RouterA to solve this problem?
Use the description command on the FastEthernet interface Fa0/0.
Configure the clock rate of the FastEthernet interface Fa0/0.
**Use the no shutdown command on the FastEthernet interface Fa0/0.
Reboot the router.

24. Refer to the exhibit. Host A wants to connect to host B on a different network. Which three IP addresses can be assigned to host A to enable this connectivity? (Choose three.)

172.16.11.36
172.16.11.95
**172.16.11.88
**172.16.11.70

172.16.11.64
**172.16.11.67

25. Refer to the exhibit. Host A wants to access e-mail. Which destination socket number will be used to communicate this request?

10.10.1.2:53
0007.A7B8.0008:25
10.10.1.3:23
**10.10.1.3:25

26. A network administrator uses the copy startup-config running-config command on a router to make configuration changes. Which component is affected by this command?

ROM
**NVRAM
RAM
flash

27. Refer to the exhibit. In a network, Hosts A and B are exchanging segments at the transport layer. Which two statements are true about this exchange? (Choose two.)

Host A is transferring files to host B using FTP.
**Host A will send the next segment containing data for this session starting with byte number 11
The segment from the destination host indicates that 11 bytes have been received successfully
**Host A is initiating a Telnet session to host B
Host B can send the next segment of the data starting with byte number 2

28. How does the transport layer allow a host to maintain multiple, simultaneous communication streams across different applications?

It uses error control mechanisms.
**It uses a connectionless protocol only for multiple simultaneous transmissions.
It uses multiple Layer 2 source addresses.
It uses multiple ports.

29. What information is contained in the header of Layer 3 to help data delivery?

port number
device physical address
**destination host logical address
virtual connection identifier

30. Refer to the exhibit. The tracert command used from host X to host Y was successful. What is the correct sequence of intermediary network devices that will be present in the trace list?

switch A, switch D, switch G, host Y
**router B, router E, router F, host Y
switch A, router B, switch D, router E, router F, switch G, host Y
switch A, router B, router F, switch G, host Y

31. While configuring a router, a network technician wants to name the router. Which prompt should the technician see when entering the hostname command?
Router>
Router#
**Router(config)#
Router(config-line)

32. An organization has decided to use IP addresses in the range 172.20.128.0 to 172.20.143.255. Which combination of network ID and subnet mask identifies all IP addresses in this range?

Network ID: 172.20.128.0 Subnet mask: 255.255.255.0
Network ID: 172.20.128.0 Subnet mask: 255.255.0.0
Network ID: 172.20.128.0 Subnet mask: 255.255.224.0
**Network ID: 172.20.128.0 Subnet mask: 255.255.240.0
Network ID: 172.20.128.0 Subnet mask: 255.255.255.240

33. Refer to the exhibit. Which logical topology describes the exhibited network?

star
**ring
point-to-point
multi-access

34. Refer to the exhibit. All devices in the network use default configurations. How many broadcast domains are there in this topology?

3
**5
7
9
11

35. Which three IPv4 addresses represent valid network addresses for a subnet? (Choose three.)

192.168.9.64/28
**192.168.9.146/28
192.168.9.96/28
**192.168.9.129/26
**192.168.9.51/26

192.168.9.64/26

36. Two routers are connected via their serial ports in a lab environment. The routers are configured with valid IP addresses, but they cannot ping each other. The show interface serial0/0 command shows that the serial0/0 interface is up but the line protocol is down. What could be the cause of this problem?

The no shutdown command has not been applied to the interfaces.
**The clock rate command has not been entered on the DCE interface.
The interface timers are not cleared.
The FastEthernet interface is emulating a serial interface by assigning it a timing signal.

37. Which device should be used for enabling a host to communicate with another host on a different network?

switch
hub
**router
host

38. Refer to the exhibit. The network administrator uses the netstat command to display the open, active, and running TCP connections on a networked host. The exhibit displays the output of this command. Which two facts can be determined from this output for accessing www.cisco.com? (Choose two.)

**The source port indicates that the session is an http session.
The connection is not successful.
**The source port of the host is 3166.
The destination port is 80.
The source port does not support communication with the destination port that is listed.
The source port indicates that a UDP session has been initiated.

39. Which OSI layer uses the header information to reassemble the data segments into streams?

application layer
network layer
presentation layer
session layer
**transport layer

40. Which three statements are true about transport layer protocols? (Choose three.)

The UDP transport layer protocol provides for low overhead data delivery.
**The TCP transport layer protocol uses windowing and acknowledgments for reliable transfer of data.
**The TCP and UDP port numbers are used by application layer protocols.
**The TCP transport layer protocol provides services to direct the data packets to their destination hosts.

The UDP transport layer protocol is a connection-oriented protocol.
The UDP transport layer protocol keeps track of all the data segments in each conversation.

41. To enhance security in a network, the network administrator uses these commands:

Router(config)# line console 0
Router(config-line)# password j1mdi2
Router(config-line)# login
What two conclusions are evident from these commands? (Choose two.)
**Users who attempt to connect to the console port of the router must enter a password.
**The entries permit access through the console by the use of j1mdi2 as the password.

The entries eliminate the need for authentication.
Access through the console will be denied because the console configuration is incomplete.
The entries prevent passwords from being displayed as plain text.

42. Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different devices?

Connection 1 - straight-through cable Connection 2 - straight-through cable Connection 3 - crossover cable
Connection 1 - straight-through cable Connection 2 - crossover cable Connection 3 - rollover cable
Connection 1 - crossover cable Connection 2 - rollover cable Connection 3 - straight-through cable
**Connection 1 - crossover cable Connection 2 - straight-through cable Connection 3 - crossover cable
Connection 1 - straight-through cable Connection 2 - rollover cable Connection 3 - crossover cable

43. Refer to the exhibit. The headers added at each layer are shown.
Which layer adds the destination and source process numbers to ensure that data is delivered to the correct application?
physical layer
data link layer
network layer
**transport layer

44. Which three statements are true about network layer addressing? (Choose three.)

It uses the last octet of the IP address to identify the network.
**It supports data communications between networks.
**It is configured by the network technician.

It is a 16-bit IPv4 address.
It prevents broadcasts.
**It uniquely identifies each host.

45. Refer to the exhibit. A PC is connected to a network. Which action will verify that the PC can communicate with its default gateway?

Use the ping 127.0.0.1 command.
Use the ipconfig command.
Use the ipconfig/all command.
**Use the ping 10.0.0.254 command.

46. Refer to the exhibit. Host A sends a frame with the destination MAC address as FFFF.FFFF.FFFF. What action will the switch take for this frame?

It will drop the frame.
It will send the frame back to host A.
**It will send the frame to all hosts except host A.
It will forward the frame to the default gateway.

47. Refer to the exhibit. The network administrator remotely accesses the CLI of RouterB from PC1 using a secure connection. Which statement is true about this connection?

The Telnet server process is running on PC1.
Only the exchange of the Telnet username and password is encrypted.
The GET request is sent to RouterA to retrieve data.
**The SSH service is used to connect PC1 to RouterB.

48. Which OSI layer uses the header information to reassemble the data segments into streams?

application layer
network layer
presentation layer
session layer
**transport layer

49. Refer to the exhibit. A router, the table of which is shown, receives a packet that is destined for 192.168.9.4. How will the router treat the packet?

It will drop the packet.
It will forward the packet via FastEthernet 0/1. 
It will forward the packet to the next hop address.
It will forward the packet to 172.16.2.0

50. Refer to the exhibit. Cable 1 and Cable 2 are wired for specific physical layer requirements. The table lists each segment by number and the cable that connects the network components on that segment. Which three segments have the correct cables installed? (Choose three.)

segment 1
segment 2
segment 3 
segment 4
segment 5
segment 6 

DOWNLOAD SOAL DAN JAWABAN PT PRACTICE SBA 2013 KLIK DISINI

~~~~~~~~~~~~~~~~~~~~~~~SEMOGA SUKSES~~~~~~~~~~~~~~~~~~~~~~~ 

Senin, 02 Desember 2013

CCNA 1 Module 11 Version 4.0 Answers


UBAMA# configure terminal
UBAMA(config)# line vty 0 4
UBAMA(config)# line console 0
UBAMA(config)# interface Serial 0/0/0
**UBAMA(config)# interface FastEthernet 0/1
2 In a Cisco router, when do changes made to the running-configuration take effect?
after a system restart
**as the commands are entered
when logging off the system
when the configuration is saved to the startup-configuration

3. Refer to the exhibit. A technician applies the configuration in the exhibit to a clean router. To verify the configuration, the technician issues the show running-config command in the CLI session with the router. What lines should the technician expect to see in the router output from the show running-config command?

enable password class
line console 0
password ccna

enable secret cisco
enable password class
line console 0
password ccna

enable secret 5 $1$v0/3$QyQWmJyT7zCa/yaBRasJm0
enable password class
line console 0
password ccna

enable secret cisco
enable password 7 14141E0A1F17
line console 0
password 7 020507550A

**enable secret 5 $1$v0/3$QyQWmJyT7zCa/yaBRasJm0
enable password 7 14141E0A1F17
line console 0
password 7 020507550A

4 When network services fail, which port is most often used to access a router for management purposes?
AUX
Ethernet
**Console
Telnet
SSH

5. Refer to the exhibit. A network administrator on HostA has problems accessing the FTP server. Layer three connectivity testing was successful from HostA to the S1 interface of RouterB. Which set of commands will allow the network administrator to telnet to RouterB and run debug commands?
RouterB(config)# enable secret class
RouterB(config)# line vty 0 4
RouterB(config-if)# login
RouterB(config)# enable secret class
RouterB(config)# line vty 0 2
RouterB(config-vty)# password cisco
RouterB(config-vty)# login
**RouterB(config)# enable secret class
RouterB(config)# line vty 0
RouterB(config-line)# password cisco
RouterB(config-line)# login
RouterB(config)# enable secret class
RouterB(config)# line aux 0
RouterB(config-line)# password cisco
RouterB(config-line)# login
RouterB(config)# enable secret class
RouterB(config)# line aux 0
RouterB(config-vty)# password cisco
RouterB(config-vty)# login

6.  Users in the network are experiencing slow response time when doing file transfers to a remote server. What command could be issued to determine if the router has experienced any input or output errors?
show running-config
show startup-config
**show interfaces
show ip route
show version
show memory

7. Refer to the exhibit. Which names correctly identify the CLI mode represented by the prompt for Switch-East4#? (Choose two.)
line configuration mode
user executive mode
global configuration mode
**privileged executive mode
interface configuration mode
**enable mode

8 What command is used to change the default router name to Fontana?
Router# name Fontana
Router# hostname Fontana
Router(config)# name Fontana
**Router(config)# hostname Fontana

9. The serial connection shown in the graphic needs to be configured. Which configuration commands must be made on the Sydney router to establish connectivity with the Melbourne site? (Choose three.)
**Sydney(config-if)# ip address 201.100.53.2 255.255.255.0
**Sydney(config-if)# no shutdown

Sydney(config-if)# ip address 201.100.53.1 255.255.255.224
**Sydney(config-if)# clock rate 56000
Sydney(config-if)# ip host Melbourne 201.100.53.2

10. Refer to the exhibit. The output is shown for the show ip route command executed on Router A. What does the IP address 192.168.2.2 represent?
Gateway for the 192.168.1.0 network
Gateway for the 192.168.3.0 network
IP assigned to the serial port on Router A
**IP assigned to the serial port on Router B
11. Refer to the exhibit. What additional command is required to allow remote access to this switch?
NA-SW1(config-if)# no shutdown
NA-SW1(config)# enable password password
**NA-SW1(config)# ip default-gateway address
NA-SW1(config-if)# description description

12 Immediately after a router completes its boot sequence, the network administrator wants to check the routers configuration. From privileged EXEC mode, which of the following commands can the administrator use for this purpose? (Choose two.)
show flash
show NVRAM
**show startup-config
**show running-config

show version

13 Which three terms correctly define the forms of help available within the Cisco IOS? (Choose three.)
**hot keys
context-check
**context-sensitive
structured check
command override
**command syntax check

14. Refer to the exhibit. A student is responsible for the IP addressing, configuration and connectivity testing of the network shown in the graphic. A ping from host B to host C results in a destination unreachable but a ping from host B to host A was successful. What two reasons could account for this failure based on the graphic and partial router output for the Dallas router? (Choose two.)
The host A is turned off.
The Fa0/0 interface on Dallas is shutdown.
The LAN cable is disconnected from host B.
**The S0/0/1 IP address of Dallas is improperly configured.
The Fa0/0 interface on Dallas is in a different subnet than host B.
**The clock rate is missing on the serial link between Dallas and NYC.
15 Which combination of keys would be used at the CLI prompt to interrupt a ping or traceroute process?
Ctrl-C
Ctrl-P
Ctrl-R
**Ctrl-Shift-6
Ctrl-Z

16. The connection between routers B and C has been successfully tested. However, after rebooting router C, the administrator noticed the response time between networks 10.10.3.0 and 10.10.4.0 is slower. Ping between the two routers is successful. A trace route indicates three hops from router B to router C. What else can be done to troubleshoot the problem?
Ping router B S0/1 connection from router C.
Trace the connection between router B to router C S0/1.
Issue a show ip route command in router B to verify routing is enabled.
**Issue a show interfaces command on router C.
17 In a Cisco device, where is the IOS file stored prior to system startup?
RAM
ROM
**Flash
NVRAM


18
Option 1 Console

19 A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a router to manage it. Which access method should be chosen?
Telnet
Console
AUX
**SSH 

~~~~~~~~~~~~~~~~~~~~~~~SEMOGA SUKSES~~~~~~~~~~~~~~~~~~~~~~~  

CCNA 1 Module 10 Version 4.0 Answers


connecting a PC to a router's console port
**connecting two routers together via their fast ethernet ports
connecting two switches together at gigabit speeds
connecting a PC to a switch at Gigabit Ethernet speeds
**connecting two devices with the same interface type at Fast Ethernet speeds

2 Which three statements are true about the role of routers in the network? (Choose three.)
They propagate broadcasts.
They enlarge collision domains.
**They segment broadcast domains.
**They interconnect different network technologies.
**Each router interface requires a separate network or subnet.
They maintain a common frame format between LAN and WAN interfaces.

3. Refer to the exhibit. A network administrator has decided to use packet capture software to evaluate all traffic from the student subnet on the way to the Internet. To ensure that all packets are captured, what network device should be used to connect the monitoring station to the network between R1 and R2?
router
**hub
switch
wireless access point

4 A network administrator is required to use media in the network that can run up to 100 meters in cable length without using repeaters. The chosen media must be inexpensive and easily installed. The installation will be in a pre-existing building with limited cabling space. Which type of media would best meet these requirements?
STP
**UTP
coaxial
single-mode fiber
multimode fiber

5. Refer to the exhibit. Which three statements are true about the exhibited topology? (Choose three.)
Hosts B and C are in the same subnet.
**Five broadcast domains are present.
**Host B is using a crossover cable to connect to the router.
Four broadcast domains are present.
xFive networks are shown.
Host B is using a rollover cable to connect to the router.

6 Which three types of connectors are commonly associated with Cisco's V.35 serial cables? (Choose three.)
RJ 11
**DB 60
**Winchester 15 pin
DB 9
**smart serial
RJ 45

7 How many host addresses may be assigned on each subnetwork when using the 130.68.0.0 network address with a subnet mask of 255.255.248.0?
30
256
**2046
2048
4094
4096

8. Refer to the exhibit. Based on the IP configuration shown, what would be the result of Host A and Host B attempting to communicate outside the network segment?

both host A and B would be successful
host A would be successful, host B would fail
**host B would be successful, host A would fail
both Host A and B would fail

9. Refer to the exhibit. What destination IP address will PC1 place in the header for a packet destined for PC2?
192.168.1.1
192.168.2.1
192.168.2.2
192.168.3.1
**192.168.3.54

10. Refer to the exhibit. Which three statements identify the type of cabling that would be used in the segments that are shown? (Choose three.)
Segment 1 uses backbone cabling.
**Segment 1 uses a patch cable.
Segment 3 uses patch cabling.
Segment 3 uses vertical cabling.
**Segment 3 uses horizontal cabling.
**Segment 4 uses vertical cabling.

11 A company is planning to subnet its network for a maximum of 27 hosts. Which subnet mask would provide the needed hosts and leave the fewest unused addresses in each subnet?
255.255.255.0
255.255.255.192
**255.255.255.224
255.255.255.240
255.255.255.248

12. Refer to the exhibit. A student is setting up a home network primarily used for extensive file transfers, streaming video, and gaming. Which network device is best suited to these types of activities in the topology shown?
wireless access point
router
hub
**switch

13

Refer to the exhibit. How many subnets are required to support the network that is shown?
2
**3
4
5

14 What does the term "attenuation" mean in data communication?
**loss of signal strength as distance increases
time for a signal to reach its destination
leakage of signals from one cable pair to another
strengthening of a signal by a networking device

15 To establish a console connection from a computer to a Cisco router, which cable wiring option would be used?
crossover cable
straight through cable
**rollover cable
V.35 cable

16 What makes fiber preferable to copper cabling for interconnecting buildings? (Choose three.)
**greater distances per cable run
lower installation cost
**limited susceptibility to EMI/RFI
durable connections
**greater bandwidth potential
easily terminated

17. Refer to the exhibit. A network technician has been allocated the 192.168.1.0/24 private IP address range for use in the network that shown in the exhibit. Which subnet mask would be used to meet the host requirements for segment A of this internetwork?
255.255.255.128
255.255.255.192
**255.255.255.224
255.255.255.240
255.255.255.248

18 Which subnet mask would be assigned to the network address of 192.168.32.0 to provide 254 useable host addresses per subnetwork?
255.255.0.0
**255.255.255.0
255.255.254.0
255.255.248.0

19 What type of network cable is used between a terminal and a console port?
cross-over
straight-through
**rollover
patch cable

20 Which option identifies the primary interface which would be used for initial configuration of a Cisco router?
AUX interface
Ethernet interface
serial interface
**console interface

21 What are three common methods for setting a UTP Ethernet port to MDI or MDIX operation? (Choose three.)
direct configuration of the device
**cable color code association
cable selection and configuration
use of cable testers to determine pinouts
**the enabling of the mechanism to electrically swap the transmit and receive pairs
**the automatic detection and negotiating of MDI/MDIX operation of the port


22 Which device is used to create or divide broadcast domains?
hub
switch
bridge
**router
repeater

23. Refer to the exhibit. Assume that all devices are using default settings. How many subnets are required to address the topology that is shown?
**1
3
4
5
7

24
What are two common methods for setting a UTP Ethernet port to MDI or MDIX operation? (Choose two.)
cable color code association
cable selection and configuration
use of cable testers to determine pinouts
**the automatic detection and negotiating of MDI/MDIX operation of the port
**the enabling of the mechanism to electrically swap the transmit and receive pairs 


~~~~~~~~~~~~~~~~~~~~~~~SEMOGA SUKSES~~~~~~~~~~~~~~~~~~~~~~~ 

CCNA 1 Module 9 Version 4.0 Answers



Host B can transmit immediately since it is connected on its own cable segment.
Host B must wait to receive a CSMA transmission from the hub, to signal its turn.
Host B must send a request signal to Host A by transmitting an interframe gap.
* Host B must wait until it is certain that Host A has completed sending its frame.
2 Ethernet operates at which layers of the OSI model? (Choose two.)

Network layer
Transport layer
* Physical layer
Application layer
Session layer
* Data-link layer

3 Which of the following describe interframe spacing? (Choose two.)

* the minimum interval, measured in bit-times, that any station must wait before sending another frame
the maximum interval, measured in bit-times, that any station must wait before sending another frame
the 96-bit payload padding inserted into a frame to achieve a legal frame size
the 96-bit frame padding transmitted between frames to achieve proper synchronization
* the time allowed for slow stations to process a frame and prepare for the next frame
the maximum interval within which a station must send another frame to avoid being considered unreachable

4 What three primary functions does data link layer encapsulation provide? (Choose three.)

* addressing
* error detection
* frame delimiting

port identification
path determination
IP address resolution

5 When a collision occurs in a network using CSMA/CD, how do hosts with data to transmit respond after the backoff period has expired?

* The hosts return to a listen-before-transmit mode.
The hosts creating the collision have priority to send data.
The hosts creating the collision retransmit the last 16 frames.
The hosts extend their delay period to allow for rapid transmission.

6 What are three functions of the upper data link sublayer in the OSI model? (Choose three.)

recognizes streams of bits
* identifies the network layer protocol
* makes the connection with the upper layers identifies the source and destination applications
* insulates network layer protocols from changes in physical equipment

determines the source of a transmission when multiple devices are transmitting

7 What does the IEEE 802.2 standard represent in Ethernet technologies?

MAC sublayer
Physical layer
* Logical Link
Control sublayer
Network layer

8 Why do hosts on an Ethernet segment that experience a collision use a random delay before attempting to transmit a frame?

A random delay is used to ensure a collision-free link.
A random delay value for each device is assigned by the manufacturer.
A standard delay value could not be agreed upon among networking device vendors.
* A random delay helps prevent the stations from experiencing another collision during the transmission.

9 Refer to the exhibit. Which option correctly matches the frame field type with the contents that frame field includes?

header field - preamble and stop frame
* data field - network layer packet
data field - physical addressing
trailer field - FCS and SoF

10 Host A has an IP address of 172.16.225.93 and a mask of 255.255.248.0. Host A needs to communicate with a new host whose IP is 172.16.231.78. Host A performs the ANDing operation on the destination address. What two things will occur? (Choose two.)

Host A will change the destination IP to the IP of the nearest router and forward the packet.
Host A will broadcast an ARP request for the MAC of its default gateway.
A result of 172.16.225.0 will be obtained.
* Host A will broadcast an ARP request for the MAC of the destination host.
A result of 172.16.224.0 will be obtained.
* A result of 172.16.225.255 will be obtained.


11 Which of the following is a drawback of the CSMA/CD access method?

* Collisions can decrease network performance.
It is more complex than non-deterministic protocols.
Deterministic media access protocols slow network performance.
CSMA/CD LAN technologies are only available at slower speeds than other LAN technologies.

12 Ethernet operates at which layer of the TCP/IP network model?

application
physical
transport
internet
data link
* network access

13 What is the primary purpose of ARP?

translate URLs to IP addresses
* resolve IPv4 addresses to MAC addresses
provide dynamic IP configuration to network devices
convert internal private addresses to external public addresses

14. Refer to the exhibit. The switch and workstation are administratively configured for full-duplex operation. Which statement accurately reflects the operation of this link?

* No collisions will occur on this link.
Only one of the devices can transmit at a time.
The switch will have priority for transmitting data.
The devices will default back to half duplex if excessive collisions occur.

15. Refer to the exhibit. Host_A is attempting to contact Server_B. Which statements correctly describe the addressing Host_A will generate in the process? (Choose two.)

A packet with the destination IP of Router_B.
A frame with the destination MAC address of Switch_A.
A packet with the destination IP of Router_A.
* A frame with the destination MAC address of Router_A.
* A packet with the destination IP of Server_B.

A frame with the destination MAC address of Server_B.

16 Which statements correctly describe MAC addresses? (Choose three.)

dynamically assigned
* copied into RAM during system startup
layer 3 address
* contains a 3 byte OUI
* 6 bytes long

32 bits long

17 Which two features make switches preferable to hubs in Ethernet-based networks? (Choose two.)

reduction in cross-talk
* minimizing of collisions
support for UTP cabling
division into broadcast domains
* increase in the throughput of communications

18 What are the two most commonly used media types in Ethernet networks today? (Choose two.)

coaxial thicknet
**copper UTP
coaxial thinnet
**optical fiber
shielded twisted pair

19 Convert the binary number 10111010 into its hexadecimal equivalent. Select the correct answer from the list below.

85
90
* BA
A1
B3
1C

20 After an Ethernet collision, when the backoff algorithm is invoked, which device has priority to transmit data?

the device involved in the collision with the lowest MAC address
the device involved in the collision with the lowest IP address
* any device in the collision domain whose backoff timer expires first
those that began transmitting at the same time


21. Refer to the exhibit. What command was executed on a host computer to produce the results shown?

route PRINT
* arp -a
arp -d
netstat
telnet


~~~~~~~~~~~~~~~~~~~~~~~SEMOGA SUKSES~~~~~~~~~~~~~~~~~~~~~~~